TotalCrypto strongly advises against the deployment of hard security measures like armed security guards. Instead, it is recommended that participating crypto projects pursue an incubator security strategy of self-policing and soft security measures.
- This can be encouraged by placing all the incubator equipment within a new registered company. Incubees should also be notified that there will be no new equipment for a while. This gives incubees two incentives to protect equipment against theft and damage. Quite simply, if a computer is stolen then this will harm incubees learning and reduce entrepreneurial opportunities. It is advised that this message is made clear to everyone participating in the incubator program.
Soft Security Measures:
The configuration of the incubator will depend on various factors such as:
- The number of incubees that can be onboarded due to budget constraints.
- The number of contributors to support incubator efforts.
- The layout of the rented local office.
Regardless of the scale of the incubator, it is recommended that the local office must have:
- An area close to the entrance door in which the exchange can operate.
- A separate room or rooms for incubator equipment and for incubees to work or learn in.
The proposed security measures are made with scalability in mind and can be deployed in an incubator of 10 people or 1,000.
#1 Remote Viewing Webcams
All areas of the local office should be covered by webcams with remote viewing. The purpose of these is to enable remote monitoring of the entire local office (both the exchange and incubator). This surveillance is also for the protection of locals in the office, the gatekeeper and incubees. If any criminal activity happens inside the office then the footage can be used in court. It also acts as a strong passive deterrent against criminal activity e.g. theft of incubator equipment.
The cost of webcam coverage depends on the size of the local office and its layout. However, webcams capable of day/night surveillance with remote viewing ability can be purchased for as low as $45 per unit. A medium sized office could have full remote viewing webcam cover for less than $450.
The proposed webcam product can be seen here.
#2 Door Entry System Into The Incubator
Once incubees are enrolled, it is advised that access to equipment should be solely restricted to:
- Gatekeepers/authorized local help.
The proposed solution for access restriction for gatekeepers or local help is to install smart locks on the doors to the incubator workspace.
Technology used: Fingerprint ID. TotalCrypto research judges this as the most cost effective technology to use in the exchange too. This will provide everyone with a single unique identifier and make it easier to track user engagement with the case study project.
Two smart locks would be required for each door to incubator workspace. The total number of locks required would depend on the layout of the local office and the scale of the incubator.
The recommended lock that fulfills all the necessary functions, at a reasonable cost, would be the Ultraloq UL3 BT. Each unit costs $249.99 and runs on 3 AA batteries. This means that security and the generation of incubee entry/exit data could be obtained for three incubator workspaces for $1,500.
#3 Computer anti-theft tracking software
It is advised that each computer should have an anti-theft tracking solution installed on it by the gatekeeper. These solutions achieve the following:
- If the computer is stolen and connected to the internet, the location of the units can be established.
- Report system allows for the remote generation of desktop screenshots.
- Messaging and alert system to enable the sending of messages to the thief and an alarm can be activated.
- Data securing, hardware scanning and screen locking.
This measure should provide an additional deterrent to theft. This can be further enhanced with non removable stickers warning of additional security measures and communicating that the unit cannot be sold on the secondary market. In an illegal peer to peer exchange, the buyer would know the item was stolen and would be rendered useless if it was plugged into an internet connection. They would also know that it’s highly likely they would be identified after purchasing the stolen unit. These measures should significantly reduce the likelihood that stolen units would be tradable on the black market, whilst acting as a tool for unit retrieval.
Recommended Solution: https://preyproject.com/
#4 Desktop and peripherals lock
Desktops, keyboards and mice can be secured with a security locking kit. It is recommended that the gatekeeper would be responsible for installing these. This solution would protect computer equipment with a cut-resistant carbon steel cable. The anchor plate could be attached to incubee desks.
The advised solution costs $27 per unit and can be viewed in more detail here.
#5 Gatekeeper, incubees & the lock on the main office door
During local office opening times, it is advised that incubator equipment should only be accessible by passing through the exchange where the gatekeeper will work. This means that any potential thieves would be seen by the gatekeeper and the incubees inside the incubator.
At night, the office door should be locked by the gatekeeper and act as another layer of security.
#6 Local Insurance
Insurance rates will vary from country to country. However, the insurance rates should be significantly lower than if these precautions were not made. It is strongly recommended that participating crypto projects take out local insurance if a decision is made to proceed with this plan.